City: unknown
Region: unknown
Country: unknown
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 2001:8d8:1000:b0d4:cb9c:7ded:6945:883c
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: SERVFAIL, id: 7464
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;2001:8d8:1000:b0d4:cb9c:7ded:6945:883c. IN A
;; Query time: 0 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Feb 19 00:35:39 CST 2022
;; MSG SIZE rcvd: 67
'
c.3.8.8.5.4.9.6.d.e.d.7.c.9.b.c.4.d.0.b.0.0.0.1.8.d.8.0.1.0.0.2.ip6.arpa domain name pointer kundenserver.de.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
c.3.8.8.5.4.9.6.d.e.d.7.c.9.b.c.4.d.0.b.0.0.0.1.8.d.8.0.1.0.0.2.ip6.arpa name = kundenserver.de.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 164.132.103.245 | attackbotsspam | Jun 20 05:49:59 DAAP sshd[20452]: Invalid user jason from 164.132.103.245 port 43332 Jun 20 05:49:59 DAAP sshd[20452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.103.245 Jun 20 05:49:59 DAAP sshd[20452]: Invalid user jason from 164.132.103.245 port 43332 Jun 20 05:50:01 DAAP sshd[20452]: Failed password for invalid user jason from 164.132.103.245 port 43332 ssh2 Jun 20 05:53:58 DAAP sshd[20530]: Invalid user vlad from 164.132.103.245 port 42650 ... |
2020-06-20 14:03:00 |
| 101.200.61.95 | attackbots | Jun 20 00:52:57 firewall sshd[20346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.200.61.95 Jun 20 00:52:57 firewall sshd[20346]: Invalid user app from 101.200.61.95 Jun 20 00:52:59 firewall sshd[20346]: Failed password for invalid user app from 101.200.61.95 port 46758 ssh2 ... |
2020-06-20 14:40:14 |
| 146.88.240.4 | attack | Jun 20 08:08:42 debian-2gb-nbg1-2 kernel: \[14892008.522968\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=146.88.240.4 DST=195.201.40.59 LEN=37 TOS=0x00 PREC=0x00 TTL=241 ID=54321 PROTO=UDP SPT=40804 DPT=7781 LEN=17 |
2020-06-20 14:11:54 |
| 111.231.69.68 | attackbotsspam | 2020-06-20T01:46:12.4990721495-001 sshd[10162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.69.68 user=root 2020-06-20T01:46:14.2399681495-001 sshd[10162]: Failed password for root from 111.231.69.68 port 42774 ssh2 2020-06-20T01:48:31.9881941495-001 sshd[10225]: Invalid user testing from 111.231.69.68 port 40530 2020-06-20T01:48:31.9912101495-001 sshd[10225]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.69.68 2020-06-20T01:48:31.9881941495-001 sshd[10225]: Invalid user testing from 111.231.69.68 port 40530 2020-06-20T01:48:33.8168521495-001 sshd[10225]: Failed password for invalid user testing from 111.231.69.68 port 40530 ssh2 ... |
2020-06-20 14:27:00 |
| 165.22.43.225 | attackbots | $f2bV_matches |
2020-06-20 14:35:31 |
| 198.211.116.79 | attack | Jun 20 05:46:01 vmd26974 sshd[26890]: Failed password for root from 198.211.116.79 port 59308 ssh2 ... |
2020-06-20 14:17:42 |
| 129.204.83.3 | attack | IP blocked |
2020-06-20 14:38:21 |
| 84.217.0.86 | attackbots | Jun 20 00:35:55 ny01 sshd[27007]: Failed password for root from 84.217.0.86 port 39342 ssh2 Jun 20 00:39:30 ny01 sshd[27442]: Failed password for root from 84.217.0.86 port 38674 ssh2 Jun 20 00:43:04 ny01 sshd[27857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.217.0.86 |
2020-06-20 14:39:17 |
| 34.96.147.16 | attackbots | Invalid user luky from 34.96.147.16 port 54506 |
2020-06-20 14:00:15 |
| 172.245.23.160 | attackbotsspam | 1,71-01/31 [bc01/m51] PostRequest-Spammer scoring: luanda01 |
2020-06-20 14:23:59 |
| 218.92.0.248 | attackspam | Jun 20 02:58:53 firewall sshd[24063]: Failed password for root from 218.92.0.248 port 7202 ssh2 Jun 20 02:58:57 firewall sshd[24063]: Failed password for root from 218.92.0.248 port 7202 ssh2 Jun 20 02:59:01 firewall sshd[24063]: Failed password for root from 218.92.0.248 port 7202 ssh2 ... |
2020-06-20 14:28:35 |
| 37.223.121.133 | attack | Unauthorized connection attempt detected from IP address 37.223.121.133 to port 22 |
2020-06-20 14:14:29 |
| 103.139.219.20 | attackspam | Invalid user m1 from 103.139.219.20 port 50032 |
2020-06-20 14:37:48 |
| 211.217.101.65 | attackspam | Jun 20 05:53:59 h2427292 sshd\[29658\]: Invalid user stue from 211.217.101.65 Jun 20 05:53:59 h2427292 sshd\[29658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.217.101.65 Jun 20 05:54:01 h2427292 sshd\[29658\]: Failed password for invalid user stue from 211.217.101.65 port 19363 ssh2 ... |
2020-06-20 14:01:36 |
| 94.191.71.246 | attackspambots | Jun 19 22:26:37 propaganda sshd[45681]: Connection from 94.191.71.246 port 56242 on 10.0.0.160 port 22 rdomain "" Jun 19 22:26:38 propaganda sshd[45681]: Connection closed by 94.191.71.246 port 56242 [preauth] |
2020-06-20 14:27:12 |